Office of Admissions

As data breaches dominate daily headlines, experts who know how to defend sensitive data are in high demand. Utica University’s Master of Science in Cybersecurity online program equips you with the skills and know-how to lead cybersecurity efforts in business, government agencies, or investigative units.
As a leader in economic crime programs for more than 25 years, Utica designed the online master’s in cybersecurity program to combine state-of-the-art practices in intelligence, forensics, and cyber operations.
This 30-credit program offers a carefully created curriculum that will give you the technical ability to protect sensitive systems from the criminals determined to corrupt them. You’ll learn how to combine a focus on cyber defense, cyber offense, and digital forensics and incident response with soft skills like critical thinking, ethics, and decision-making, which are vital to success in the field. The M.S. in Cybersecurity degree also features three career-focused specializations to enhance your skill set.
Plus, you can choose from three specializations in the online cybersecurity degree program to focus your coursework and align your education with your career goals and interests:
Equipped with this sought-after skill set and real-world knowledge, you’ll graduate prepared to lead in the field of cybersecurity in less than two years.
100%
online, part-time
2
years to complete
30
credit hours
$895
cost per credit
Put your cybersecurity skills to the test with Utica University’s upcoming cyber range. Made possible by a recent $150,000 award from the George I. Alden Trust and $90,000 from the Fred L. Emerson Foundation, this range will give you the opportunity to problem-solve real-world events like ransomware attacks or data breaches in a controlled environment.
With exposure to so many different simulations and experience with real, cutting-edged tools used by professionals, you’ll know from experience what interests you most and what you want to pursue after graduation.
In 2023, RangeForce was named the Most Comprehensive Cyber Defense Readiness Platform at the Global Infosec Awards.5
Gain crucial cybersecurity experience and become a better cyber defender. Many of Utica University’s cybersecurity courses include RangeForce, an innovative cloud-based training platform, developed by the team that built the cyber range for NATO’s Cooperative Cyber Defense Center, that simulates real-world cybersecurity battles. You’ll work to conquer threats, beat hacking simulations, and perfect your approach through gamified activities. These immersive experiences are separated into Learning Paths. As you successfully complete each Learning Path, you’ll earn impressive digital badges that you can share on your résumé and on social media platforms like LinkedIn.
The skills you gain from Utica University’s RangeForce access are immediately applicable to the current cybersecurity landscape. These are just some of the well-established organizations that are using RangeForce to develop new skillsets for their employees:
The top 10% of Information Security Analysts earned more than $186,420 in 2024, with the number of job opportunities expected to grow 33% through 2033.1 CyberSeek’s industry heat map showed over 700,000 cybersecurity job openings were active from October 2021-September 2022. Meanwhile, there’s a 17% gap in the number of workers needed to fill cybersecurity jobs across the U.S.2
With your online master’s in cybersecurity, you’ll be ready to join the top tier of this workforce and earn more while making an impact on data security.
Cybersecurity is always evolving. Working IT security professionals who have theoretical and foundational knowledge from the online master’s in cybersecurity program and practical network and security skills have an advantage in the field over those without both.
Cybersecurity professionals must stay up-to-date on vulnerabilities, exploits, and incoming attacks. Job responsibilities might also include:
The National Security Agency and the Department of Homeland Security have designated Utica University as a National Center of Academic Excellence in Cyber Defense Education (CAE/CDE) through the academic year 2024.
Utica is a CompTIA academic partner, our online cybersecurity degree supports students’ preparation for for industry certifications like Cloud+, CYSA+, and PenTest+ certification exams.
Only an estimated 20-25% of cybersecurity roles are held by women. With a commitment to decreasing this gender disparity, Utica University is proud to be one of a select number of New York universities to have a Women in Cybersecurity (WiCyS) student chapter. Join a network that promotes the recruitment, retention, and advancement of women in cybersecurity and create lifelong connections. Members of WiCyS have priority access to security training, mentorships, job fairs, and conference scholarships.
Choose the general track or one of three specializations in the cybersecurity bachelor’s program. Each will provide you with the most up-to-date skills and expertise to hit the ground running in the industry segment of your choice.
Pursue your passion for collecting and preparing evidence for computer crimes such as fraud, ransomware and cyber espionage with courses that emphasize a comprehensive understanding of the forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.
Examine defensive and offensive modes of cyber operations as you become a cybersecurity expert. You’ll graduate ready to detect, investigate, and prevent cybercrime for employers ranging from defense contractors to financial services to critical infrastructure.
Master the technical, legal, and ethical aspects of electronic crime, white collar crime and fraud investigation with a focus on risk and compliance, legal issues, fraud management, and advanced fraud analysis techniques.
Learn More About Our Cybersecurity Specializations
“The program perfectly balanced research components and engaging hands-on labs, allowing me to delve deeply into theoretical concepts while applying them in practical, real-world settings. The faculty, comprised of professionals from various sectors of the cybersecurity industry, brought diverse perspectives and profound insights into the classroom. The focus on the latest tools and technologies currently dominating the field ensured that, as students, we gained familiarity and proficiency with the most relevant and advanced resources, equipping us for immediate entry into the workforce. Additionally, the program excelled in providing opportunities for collaboration.”
– Steven Gerhart, Senior Solutions Architect at Cisco Systems
Our faculty have built their expertise on the front lines of cybersecurity. With diverse backgrounds in the industry, many faculty members are still engaged in the field and have expertise in information security, digital forensics, incident response, attack methodology, and more.
As a student of the online cybersecurity degree program, your instructors will provide you with personalized instruction, mentorship, career advice, and a network of opportunities.
Our faculty have built their expertise on the front lines of cybersecurity. With diverse backgrounds in the industry, many faculty members are still engaged in the field and have expertise in information security, digital forensics, incident response, attack methodology, and more.
As a student of the online cybersecurity degree program, your instructors will provide you with personalized instruction, mentorship, career advice, and a network of opportunities.
Adjunct Lecturer of Cybersecurity & Information Assurance
Director of Cybersecurity Programs/Associate Professor, Cybersecurity
Adjunct Lecturer of Cybersecurity & Information Assurance
Associate Professor of Cybersecurity
Professor of Practice- Cybersecurity
John W. Oevering, M.S., M.B.A.
Assistant Director of Cybersecurity & Professor of Practice of Cybersecurity
Andrew Orechovesky, D.Sc., CISSP
Adjunct Lecturer of Cybersecurity & Information Assurance
Michael VanDusen, Ph.D.-IT, CISSP, CISM, CCSP
Adjunct Lecturer of Cybersecurity
Adjunct Lecturer of Cybersecurity
Adjunct Lecturer of Cybersecurity
Utica University’s Cybersecurity Advisory Council was formed in 2024 to further elevate Utica’s cybersecurity programs. Members include the Chief of Staff of the United States Secret Service and leaders from Dragos, Microsoft, Google Cloud, and more.
The mission of the Advisory Council is to:
Jeffrey Amell
Hilton Worldwide
Director Cybersecurity
Jacob Benjamin
Dragos Global
Practice Lead
Tony Dessaro
KPMG Director
Cyber Response
Yuri Diogenes
Microsoft
Principal PM
Kyo Dolan
USSS
Chief of Staff
Ryan Duquette
MNP
Partner
National Lead Digital Forensics
Vincent Esposito
Google Cloud
Head of Americas
Customer Success Managers
Jeff Foley
ZeroFox
Vice President of Research
Brenda Gooshaw Samson
Flowers Foods & Subsidiaries
Director of Cybersecurity Governance and Culture
Rocco Grillo
Alvarez & Marsal
Managing Director of Global Cyber Risk & IR Investigative Services
Dan Kalil
DeepSeas
VP, Global Client Success & Delivery
Spencer Lasker
Citi
Senior VP
Global Lead of Tactical and Vulnerability Cyber Intelligence
Norman Leach
DAF CLOUDworks
Director
Nathan Little
Arctic Wolf
VP of Incident Response Strategy
Vito Nozza
C1
Director (Chief Architect) – Information Security Advisory Services
Salvatore Paladino
AIS
Director of Cyber Operations R&D
Griffin Reid
KPMG
Lead, Operations & Delivery, Cyber
Brendan Rooney
Booz Allen Hamilton
SVP, Global Commercial Incident Response Lead
Edith Santos
Apollo Cyber
COO
Melissa Sokolowski
Confidential
VP Digital Forensics & Incident Response
Mike Woods
NCIS
Special Agent in Charge Cyber Field Office
Sources:
1. (ISC)2. (2024). Cybersecurity Workforce Study. Retrieved May 12, 2025, from https://www.isc2.org/Insights/2024/10/ISC2-2024-Cybersecurity-Workforce-Study
2. IBM (2025). Cost of a Data Breach Report 2025. Retrieved May 12, 2025, from https://www.ibm.com/reports/data-breach.
3. Cyberseek.org (2025). Cybersecurity Supply/Demand Heat Map. Retrieved May 12, 2025 from https://www.cyberseek.org/heatmap.html
4. Bureau of Labor Statistics (2022, September 8). Information Security Analysts. Retrieved on February 17, 2023, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
5. Payscale (2023). Security Administrator: Salary. Retrieved February 17, 2023, from https://www.payscale.com/research/US/Job=Security_Administrator%2C_Computer_Network/Salary
6. Payscale (2023). Information Assurance Engineer: Salary. Retrieved February 17, 2023, from https://www.payscale.com/research/US/Job=Information_Assurance_Engineer/Salary
7. CyberSeek (n.d.). Cybersecurity Supply/Demand Heat Map. Retrieved November 9, 2022, from https://www.cyberseek.org/heatmap.html.
8. U.S. News & World Report (n.d.). Online Cybersecurity Degree: An Overview. Retrieved December 3, 2018, from https://www.usnews.com/education/online-education/cyber-security-bachelors-degree
9. Statista (n.d.). Annual number of data compromises and individuals impacted in the United States from 2005 to 2024. Retrieved May 12, 2025, from https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
Each course in our Master of Science in Cybersecurity program is carefully designed to prepare you in less than two years for the real-world challenges cybersecurity leaders face every day.
Seven courses comprise the core program, followed by your choice of three specializations that give an extensive understanding of a specific discipline. You’ll complete this program with skills in cybersecurity, leadership, ethics, and decision-making that are vital in any role.
Course abstracts on this page are meant to provide an overview and are subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica University Academic Catalog and in adherence to regional compliance. Select the appropriate Graduate Catalog from the dropdown.
Applying to our online master’s in cybersecurity program is straightforward, with no GRE or GMAT required. You’ll just need to submit the following:
Transfer credit is awarded for courses taken at a regionally accredited college that are equivalent to those taught at Utica University and you’ve received a grade of “B” or better. Note that we require official transcripts from all colleges you’ve attended, as well as a transcript showing degree awarded.
Shortly after you receive your letter of admission, you will receive an evaluation of your transfer credits from the Registrar’s Office. If you want to review possible credit eligibility ahead of time, use TES®.
International Credential Evaluation of transcripts showing equivalency to a U.S. bachelor’s degree with minimum GPA of 3.0 is required for this program.
If English is not your first language, submit your test scores from either the TOEFL or IELTS.
Utica requires a TOEFL score of 550 written, 213 computer-based, or 79 internet-based. Utica requires a IELTS score of 6.0.
Get StartedThis 30-credit program costs $895 per credit hour. Utica University is dedicated to making an advanced education accessible and affordable. Learn more about financial aid, including grants, student loans, and other options, on the Financial Aid tab of our Graduate Admissions page.
Learn moreChoose the general track or one of four specializations in the cybersecurity master’s program. Each will provide you with the most up-to-date skills and expertise to hit the ground running in the industry segment of your choice.
Pursue your passion for collecting evidence and investigating computer crimes such as fraud, ransomware and data theft with courses that emphasize a comprehensive understanding of the forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence. Computer crime encompasses a wide range of illegal activities that cost corporations revenue and pose a threat to our national security and individuals alike. In this 100% online master’s program, you’ll gain the skills you need for cyber forensics certifications and make an impact in this rapidly growing field.
Use your cybersecurity skills to fight fraud and other cybercrime. You’ll graduate with Utica University’s Master of Science in Cybersecurity, Digital Forensics specialization knowing how to address ever-changing attack and infiltration techniques and with hands-on experience in cyber intelligence, critical infrastructures, and investigative principles.
The foundation of knowledge gained through this specialization will support your preparation for testing for the following industry-recognized cyber forensics certifications:
Graduates of the Digital Forensics specialization can go on to careers in a range of investigative areas, including:
The Digital Forensics specialization is designed to provide you with a comprehensive skill set that is particularly valuable to businesses, banks, and other corporate institutions. You’ll learn to leverage investigative best practices and how to protect organizations from cybercriminals.
$108,266/year
As a cloud security analyst, you’ll ensure that security is implemented as part of the design and development measures of a client’s cloud solution. You’ll also review existing cloud security measures and processes and provide updated recommendations based on ever-changing best practices.1
$72,849/year
When an attack is successful, an incident response analyst works with the cybersecurity defense team to keep it from escalating, minimize the effect, and ensure all traces of the breach have been eradicated through a system analysis after the resolution is thought to be complete.2
Other titles you may qualify for:
With a unique focus on coursework in networks, defensive and offensive tactics, vulnerability assessments, penetration testing, and programming, this specialization provides you with skills to dominate in the area of Cyber Operations while keeping your organization safe. Explore incident response to system compromise, risk management decision-making, and legal and regulatory analyses. Learn about building and configuring secure environments, providing trusted solutions, and more.
Data breaches are a grave concern for today’s organizations. There is a need for experts to identify when an unlawful intrusion has occurred and what data may have been exposed or exfiltrated. This course focuses on using network-based information sources to help answer those questions.
Sources
1. https://www.glassdoor.com/Salaries/cloud-security-analyst-salary-SRCH_KO0,22.htm
2. https://www.salary.com/research/salary/recruiting/incident-response-analyst-salary/chicago-il
Cybersecurity is more than just defending against cyberattacks. Through 21 core credits and 9 specialization credits, you’ll examine both defensive and offensive modes of cyber operations in Utica University’s Master of Science in Cybersecurity, Cybersecurity Operations specialization.
By understanding both sides of the spectrum through hands-on coursework, you’ll graduate ready to detect, investigate, and prevent cybercrime for employers ranging from defense contractors to financial services to critical infrastructure.
7.9 Billion. In aggregate, Spirion reports that was the economic toll in 2021 for organizations that experienced data breaches, with an average cost of 4.24 million per breach. They note that cyberattacks are a near-constant threat to modern business. Attacks occur every 10 seconds, and in January of 2021 alone, there were more data records compromised than the total number of records stolen in 2017. IBM reports that in 2021, an average of 4.24 million per breach was reached — the highest average in their 17-year history in reporting on the topic. Organizations that implemented the skills and technologies like those taught in the Cybersecurity Operations Specialization at Utica, like artificial intelligence (AI) and a zero trust approach, reduced their costs by millions. And those with a current cloud migration strategy contained the breach, on average, 77 days faster than those in earlier stages of modernization.
As a computer network defense analyst, you could be responsible for assessing security controls and applying appropriate incident response methods to ensure critical networks are properly protected from cyberattack. You would also investigate threats, manage network access, and more.1
A Security Operations Center (SOC) Analyst finds security breaches and likely cyberattacks by reviewing incident notifications and running vulnerability assessments. They’ll report attacks to superiors, and create improvement strategies for better security. They’ll also complete risk analysis and security operations to find holes in their systems before attackers can.2
Other titles you may qualify for:
As one of the few programs in the U.S. that address cyber operations technology, this specialization uses virtual hands-on labs to help students gain critical skills in current technologies. Utica’s online infrastructure provides special servers, virtual machines, and experimental environments that give students a “learn by doing” experience. Labs include penetration testing, vulnerability assessment, data hiding and steganography, anonymity, and autonomous cyber operations.
This practicum course is a graduate level course in the specialized area of malware analysis that is designed to give students supervised practical application of previously or concurrent studied theory in malware mitigation and analysis. This course uses knowledge and methods presented in earlier courses as theory or examples in real-live practical examples. Students will learn the nuances of finding and mitigating malware which will be particularly well suited to mitigating targeted attacks. The student will use specialized malware analysis tools and environments along with a deep understanding of the technical methods of malicious codes (malcode). We will also highlight specific methods to gain speed in an analysis and how enterprise-wide mitigation methods may be employed.
Sources
1. https://www.salary.com/research/salary/position/network-defense-analyst-salary
2. https://www.salary.com/research/salary/listing/soc-analyst-salary
Cybersecurity and financial crime investigation are more interconnected than ever, with modern criminals using cyber tools and advanced malware to commit advanced, high-technology crimes.
Crimes of this nature result in the loss of substantial amounts of money and have a serious effect on business, government, individuals, and the national economy. Today’s information-intensive organizations are in desperate need of employees who understand both cybersecurity and financial crime investigation.
Apply your cybersecurity background to the realm of fraud with Utica University’s Master of Science in Cybersecurity, Cybercrime and Fraud specialization. You’ll learn to leverage fraud risk and compliance best practices and how to utilize fraud management technologies to protect businesses from cybercriminals.
The Cybercrime and Fraud specialization is designed to provide you with a comprehensive skill set that is particularly valuable for professionals in banking and other financial institutions. With that said, graduates of this program are also equipped to enter industries ranging from healthcare to insurance and beyond.
CAREER SPOTLIGHT: RISK ANALYST
$69,116/year
As a risk analyst, specifically in the banking and financial industry, you would be responsible for compiling and analyzing data in order to calculate risks associated with the approval of client and/or vendor relationships. These professionals create reports, establish quality control measures, and more.1
CAREER SPOTLIGHT: ANTI MONEY LAUNDERING (AML) COMPLIANCE OFFICER
$70,014/year
As a compliance officer, specifically with AML skills, you would be responsible for assessing and ensuring state and federal compliance by conducting periodic internal financial audits and establishing risk management strategies.2
Other titles you may qualify for:
Through our innovative curriculum, you’ll examine current issues and trends in financial crime and compliance management, white-collar crime investigation, and fraud prevention and detection. Courses you’ll take include:
You’ll examine the challenges of management in an increasingly technological environment. You’ll also explore the history and evolutionary development of counter-fraud technology and the integration of fraud management in the development of new corporate products or instruments. You’ll learn to anticipate new forms of fraud based on the application of new and anticipated technologies.
Sources
1. PayScale (n.d.). “Average Risk Analyst Salary.” Retrieved February 22, 2023 from https://www.payscale.com/research/US/Job=Risk_Analyst/Salary
2. PayScale (n.d.). Average Compliance Officer with Anti-Money Laundering (AML) Skills Salary. (n.d.). Retrieved February 22, 2023 from https://www.payscale.com/research/US/Job=Compliance_Officer/Salary/86503f63/Anti-Money-Laundering-AML
With your Master of Science in Cybersecurity from Utica University, you’ll have the technical skills and specialized expertise to join the front lines in the battle against cybercrime. Plus, the curriculum will help you prepare to test for professional certifications like Cloud+, CYSA+, and PenTest+.
The average cybersecurity salary was $108,967 in 2025. With projected job growth of 33% by 2033, and a 17% gap in workers needed to fill current openings, there is no shortage of career potential for master’s in cybersecurity jobs.2 Because data breaches are increasing and a shortage of qualified experts persists, your new skills will put you in high demand.
As you build your skills through our industry-responsive curriculum, you’ll choose a specialization in Cybercrime and Fraud, Digital Forensics, or Cybersecurity Operations.
Explore master’s in cybersecurity salary and job opportunities below.
► TOP 10%
Computer and Information Security Analysts (ISA) earn more than $165,920 annually1
► 33% GROWTH
Cybersecurity ISA job outlook projected, 2023–20331
► 4.7 MILLION
Unfilled cybersecurity jobs in 20243
Your earning potential and job outlook are high when you obtain a master’s in cybersecurity. Qualify for roles like:
Information security analysts are responsible for providing security solutions for their companies. Their primary duties include researching, collecting data, developing secure strategies, and maximizing productivity. They also are in charge of implementing security principles while following strict privacy policies.1
With a high-level understanding of the principles and technical tactics of cyberattacks and defense, security architects are responsible for their company’s network and computer security. At the early stages of the security life cycle, the security architect acts as a project leader to plan, research, and design elements of security.4
Take on the demanding task of ensuring all security teams, protocols, and systems contribute to a successful and productive business or organization, guaranteeing the protection of the company’s assets, information, and employees. They are also responsible for coordinating crisis/security management programs and efforts throughout the company and informing all employees of company security policy changes.5
Sources:
1. https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
2. https://www.cyberseek.org/heatmap.html
3. https://www.isc2.org/Insights/2024/10/ISC2-2024-Cybersecurity-Workforce-Study
4. https://www.payscale.com/research/US/Job=Security_Architect/Salary
5. https://cybersn.com/role/chief-security-officer-cso/
For a general list of frequently used logins, you can also visit our logins page.